Подія
Створення програм і агентів AI
17 бер., 21 - 21 бер., 10
Приєднайтеся до серії нарад, щоб створити масштабовані рішення зі ШІ на основі реальних випадків використання з колегами-розробниками та експертами.
Зареєструватися заразЦей браузер більше не підтримується.
Замініть його на Microsoft Edge, щоб користуватися перевагами найновіших функцій, оновлень безпеки та технічної підтримки.
You can use Azure Policy to automatically install the Azure Monitor Agent on existing and new virtual machines and have relevant data collection rules (DCRs) automatically associated with them. This article describes the built-in policies and initiatives you can use for this functionality and Azure Monitor features that can help you manage them.
Use the following policies and policy initiatives to automatically install the agent and associate it with a DCR each time you create a virtual machine, virtual machine scale set, or Azure Arc-enabled server.
Примітка
Azure Monitor has a preview DCR experience that simplifies creating assignments for policies and initiatives that use DCRs. The experience includes initiatives that install the Azure Monitor Agent. You can choose to use that experience to create assignments for the initiatives described in this article. For more information, see Manage DCRs and associations in Azure Monitor.
Before you begin, review prerequisites for agent installation.
Примітка
Per Microsoft identity platform best practices, policies for installing the Azure Monitor Agent on virtual machines and virtual machine scale sets rely on a user-assigned managed identity. This option is the more scalable and resilient managed identity for these resources.
For Azure Arc-enabled servers, policies rely on a system-assigned managed identity as currently the only supported option.
You can choose to use the individual policies from the policy initiatives described in the next section to perform a single action at scale. For example, if you want to automatically install only the agent, use the second agent installation policy in the initiative.
Built-in policy initiatives for Windows and Linux virtual machines and scale sets provide end-to-end, at-scale onboarding by using the Azure Monitor Agent:
Примітка
The policy definitions include only the list of Windows and Linux versions that Microsoft supports. To add a custom image, use the Additional Virtual Machine Images parameter.
These initiatives contain individual policies that:
(Optional) Create and assign one built-in user-assigned managed identity per subscription and per region. Learn more.
Bring Your Own User-Assigned Identity:
Install Azure Monitor Agent extension on the machine, and configure it to use the user-assigned identity as specified by the following parameters:
Bring Your Own User-Assigned Identity:
User-Assigned Managed Identity Name: If you use your own identity (true is selected), specify the name of the identity that's assigned to the machines.
User-Assigned Managed Identity Resource Group: If you use your own identity (true is selected), specify the resource group where the identity exists.
Additional Virtual Machine Images: Pass additional virtual machine image names that you want to apply the policy to, if they are not already included.
Built-In-Identity-RG Location: If you use a built-in user-assigned managed identity, specify the location to create the identity and the resource group. This parameter is used only when the Bring Your Own User-Assigned Managed Identity parameter is set to false.
Create and deploy the association to link the machine to specified DCR.
The initiatives or policies apply to each virtual machine as it's created. A remediation task deploys the policy definitions in the initiative to existing resources. You can configure the Azure Monitor Agent for any resources that were already created.
When you create the assignment by using the Azure portal, you have the option of creating a remediation task at the same time. For information on the remediation, see Remediate noncompliant resources by using Azure Policy.
Create a DCR to collect data from the agent and send it to Azure Monitor.
Подія
Створення програм і агентів AI
17 бер., 21 - 21 бер., 10
Приєднайтеся до серії нарад, щоб створити масштабовані рішення зі ШІ на основі реальних випадків використання з колегами-розробниками та експертами.
Зареєструватися заразНавчання
Модуль
Дізнайтеся, як налаштувати та інтегрувати агент log Analytics з робочою областю в Defender for Cloud за допомогою порталу Azure, що підвищує можливості аналізу даних безпеки.
Сертифікація
Microsoft Certified: Identity and Access Administrator Associate - Certifications
Демонстрація функцій ідентифікатора Microsoft Entra для модернізації рішень ідентичностей, впровадження гібридних рішень і впровадження керування ідентичностями.
Документація
Azure Monitor Agent Overview - Azure Monitor
Get an overview of the Azure Monitor Agent. Learn how you can use the Azure Monitor Agent to collect monitoring data from the guest operating system of virtual machines.
Install and Manage the Azure Monitor Agent - Azure Monitor
Learn options for installing and managing the Azure Monitor Agent on Azure virtual machines and Azure Arc-enabled servers.
Collect data from virtual machine client with Azure Monitor - Azure Monitor
Learn how to collect data from virtual machines, virtual machine scale sets, and Azure Arc-enabled on-premises servers by using the Azure Monitor Agent.